Mobile Threat management (MTM) is a real issue the enterprise must take on as part of its innovation practices. This blog serves up some pointers about the marketplace when you are ready to consider your vendor options for mobile deployment and mobile management services.
Enterprise Mobility Management (EMM) has become a mainstay of mobile deployments today and is recognized as a must for any enterprise company. While EMM handles the basics of securing mobile devices and protecting corporate data and assets, it falls short in several areas, included Man-in-the-Middle attacks, Malware, phishing attacks and modified devices (jailbreaking, etc.). For this reason, a new security add-on has taken shape in the industry: Mobile Threat Management (MTM) software. This cutting-edge technology in the mobile space is just now coming into its own and being recognized as a key need by enterprise executives, augmenting EMM to fully secure devices.
IDC sees the mobile threat management market gaining momentum as more enterprises decide that EMM/MDM and native sandboxing and segmentation on mobile operating systems (OSs) are not enough to meet overall mobile threat management needs. According to IDC's 2017 U.S. Enterprise Mobility Decision Maker Survey, half of U.S. enterprises and SMBs have deployed some form of mobile device security solution — mobile antimalware, mobile threat management, or mobile app scanning. An additional one-third of U.S. businesses not using MTM today plan to deploy this technology in the future.
Since this is a new technology, potential buyers should consider a number of factors as they make their buyer decision:
- Current capabilities. Customers should be aware that there are necessary baseline capabilities that ensure that the product goes beyond device management or simple virus scanning to provide true threat management that is not cumbersome to the user.
- Evolving product road map. The road map extends past basic product functionality and looks to accommodate current mobile device offerings and is future looking to position the company and product to be a leader in the industry.
- Customer assessment of vendor. No matter how many features a product has or how long it's been on the market, if it is does not meet the needs of the customer or if it is cumbersome for the customer to install, support, or use, it will not be adopted.
- Support. As MTM is still a relatively new area for most enterprises, it is important that support is easily accessible to the IT organization.
- Intellectual property. To be a true leader in MTM, it is important for the product to go beyond just basic capabilities to incorporate advanced technologies like machine learning and AI capabilities.
You can find full assessment and analysis of the following vendors in IDC's latest report on mobility, IDC MarketScape: Worldwide Mobile Threat Management Security Software 2017 Vendor Assessment (Document click here.). For a full abstract on this report,
- Better Mobile Security
- Check Point
For more information on facing digital transformation, visit idc.com/itexecutive for complimentary downloads and more.